Intelligence & Analytics September 1, 2022 Raspberry Robin and Dridex: Two Birds of a Feather 8 min read - IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin…
Endpoint March 15, 2019 Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? 3 min read - The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.
July 31, 2017 TrickBot Learns From WannaCry and Petya by Adding Self-Spreading Worm Module 2 min read - Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
Incident Response June 7, 2017 Using Network Insights to Stay One Step Ahead of Emerging Threats 3 min read - With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
Software Vulnerabilities May 25, 2017 Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? 6 min read - IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
April 25, 2017 Stuxnet: The Computer Worm That Keeps on Living 2 min read - Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
April 20, 2017 Vigilante White-Hat Hacker Boosts IoT Device Security 2 min read - Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
December 28, 2016 Burrowing Bad? Ransomworms Deepen Crypto-Ransomware Threats in 2017 2 min read - What's worse than ransomware? Ransomworms. Evolving crypto-ransomware techniques could wreak havoc on the IT security landscape in 2017.
June 1, 2016 No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs 2 min read - A new malware called ZCryptor was recently found to be leveraging attack techniques that resemble worms, making it the first case of a ransomworm.
March 9, 2015 Android Users Infected With Gazon Mobile Malware Via Phony Amazon Gift Card Scheme 2 min read - Android smartphones are being hit with text messages promising an Amazon gift card, but it's really a way for cybercriminals to install mobile malware.